Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 07:30

General

  • Target

    d9e05f78d8fc6775ff208aa8925f97f3_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    d9e05f78d8fc6775ff208aa8925f97f3

  • SHA1

    8072f299b17ce6273ac16077850262241e16e41a

  • SHA256

    bf267febfbb3c9e56d210288d9bc6aced78c7dc28f4a5471acf307e8b5f03675

  • SHA512

    9a270e72b2f56621fe6ea97fbf27c56dac79ac22841bacaa5b7082927135ae36fa0bafee948b62d6c339b0ec94c07469708865f0b9e73defef6f685755b82227

  • SSDEEP

    3072:GDqSgEjQPpQ1FpJYdYFOvOdYuGLj/7Ij:GNv4YpSdYBkb

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9e05f78d8fc6775ff208aa8925f97f3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d9e05f78d8fc6775ff208aa8925f97f3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Users\Admin\AppData\Local\Temp\d9e05f78d8fc6775ff208aa8925f97f3_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d9e05f78d8fc6775ff208aa8925f97f3_JaffaCakes118.exe"
      2⤵
      • Modifies firewall policy service
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Users\Admin\AppData\Roaming\Firewall SysScan\cfmmon.exe
        "C:\Users\Admin\AppData\Roaming\Firewall SysScan\cfmmon.exe" in
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Users\Admin\AppData\Roaming\Firewall SysScan\cfmmon.exe
          "C:\Users\Admin\AppData\Roaming\Firewall SysScan\cfmmon.exe"
          4⤵
          • Executes dropped EXE
          PID:4368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\240623359.exe

    Filesize

    316B

    MD5

    9c6ce68f3b8378b80021a70460f70b51

    SHA1

    663385ab1710fde3d4266061e29069150d7e2ed0

    SHA256

    a919b1b674d0682f0df3a4fb0e467823e17497ca758d9e3a1e2e204f40eb50c1

    SHA512

    691827b65996cf0764876e764dc086c222a07d350818a7f0627b193ca3ce19fddf410d9fd5d5813696fd591ec846484e48ad27e7e20589bafafa21aaf1d4f636

  • C:\Users\Admin\AppData\Roaming\Firewall SysScan\cfmmon.exe

    Filesize

    132KB

    MD5

    5a0c57c55b81fe7f942d3bc0026b176a

    SHA1

    6f9ec58bb08f91cbc01db9acd92a7504d9410b81

    SHA256

    5a333a7d9a938cd19dff1cc03c303bbdb5252821e7b87c84f1cec291a1d2b118

    SHA512

    daba5e22f9c4ee23a639417130e57418f4d55c6e52d38bdc3eff8d8a99ec08a2cdfd3fa8c1706ea8269de98e2b84ce3abe85b95e186d4ab4097180d9cda086f2

  • memory/212-16-0x00000000006F0000-0x00000000006F1000-memory.dmp

    Filesize

    4KB

  • memory/212-20-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/212-6-0x0000000002D00000-0x0000000002D01000-memory.dmp

    Filesize

    4KB

  • memory/212-4-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/212-2-0x00000000006F0000-0x00000000006F1000-memory.dmp

    Filesize

    4KB

  • memory/212-17-0x00000000020A0000-0x00000000020A1000-memory.dmp

    Filesize

    4KB

  • memory/212-18-0x00000000020B0000-0x00000000020B1000-memory.dmp

    Filesize

    4KB

  • memory/212-3-0x00000000020B0000-0x00000000020B1000-memory.dmp

    Filesize

    4KB

  • memory/212-23-0x0000000003080000-0x0000000003081000-memory.dmp

    Filesize

    4KB

  • memory/212-21-0x0000000003060000-0x0000000003061000-memory.dmp

    Filesize

    4KB

  • memory/212-5-0x00000000020F0000-0x00000000020F1000-memory.dmp

    Filesize

    4KB

  • memory/212-22-0x0000000002D00000-0x0000000002D01000-memory.dmp

    Filesize

    4KB

  • memory/212-19-0x00000000020C0000-0x00000000020C1000-memory.dmp

    Filesize

    4KB

  • memory/1860-27-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1860-26-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1860-32-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1860-24-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2272-38-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2272-39-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2272-41-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2272-50-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2272-56-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/4368-55-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB